Human-to-Human authorization for resource sharing in SHAD: Roles and protocols

  • Authors:
  • Enrique Soriano;Francisco J. Ballesteros;Gorka Guardiola

  • Affiliations:
  • Laboratorio de Sistemas, Universidad Rey Juan Carlos, Madrid, Spain;Laboratorio de Sistemas, Universidad Rey Juan Carlos, Madrid, Spain;Laboratorio de Sistemas, Universidad Rey Juan Carlos, Madrid, Spain

  • Venue:
  • Pervasive and Mobile Computing
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

One aim of pervasive computing is to allow users to share their resources so that they seem to be part of a single pervasive computer. This is just an illusion, the result of the synergy between different systems and resources. SHAD, introduced in PerCom 2007, is the first architecture that offers actual Single Sign-On to avoid authentication obtrusiveness and maintain the illusion of a single, pervasive computer. This paper describes how SHAD allows users to securely share their resources in a easy, natural, and intuitive way. It also describes its role-based Human-to-Human architecture, the threat model, and the protocols involved. Last but not the least, it presents results of further evaluation for our working implementation.